2 research outputs found
An Image Encryption Scheme Based on Chaotic Logarithmic Map and Key Generation using Deep CNN
A secure and reliable image encryption scheme is presented in this study. The
encryption scheme hereby introduces a novel chaotic log-map, deep convolution
neural network (CNN) model for key generation, and bit reversion operation for
the manipulation process. Thanks to the sensitive key generation, initial
values and control parameters are produced for the hyperchaotic log-map, and
thus a diverse chaotic sequence is achieved for encrypting operations. The
scheme then encrypts the images by scrambling and manipulating the pixels of
images through four operations: permutation, DNA encoding, diffusion, and bit
reversion. The encryption scheme is precisely examined for the well-known
images in terms of various analyses such as keyspace, key sensitivity,
information entropy, histogram, correlation, differential attack, noisy attack,
and cropping attack. To corroborate the scheme, the visual and numerical
results are even compared with available outcomes of the state of the art.
Therefore, the proposed log-map based image encryption scheme is successfully
verified and validated by the superior absolute and comparative results
Coupling Chaotic System Based on Unit Transform and Its Applications in Image Encryption
Chaotic maps are very important for establishing chaos-based image encryption
systems. This paper introduces a coupling chaotic system based on a certain
unit transform, which can combine any two 1D chaotic maps to generate a new one
with excellent performance. The chaotic behavior analysis has verified this
coupling system's effectiveness and progress. In particular, we give a specific
strategy about selecting an appropriate unit transform function to enhance
chaos of generated maps. Besides, a new chaos based pseudo-random number
generator, shorted as CBPRNG, is designed to improve the distribution of
chaotic sequences. We give a mathematical illustration on the uniformity of
CBPRNG, and test the randomness of it. Moreover, based on CBPRNG, an image
encryption algorithm is introduced. Simulation results and security analysis
indicate that the proposed image encryption scheme is competitive with some
advanced existing methods.Comment: 41 pages, 15 figure